Network Vulnerability White Papers

(View All Report Types)
Justification and ROI for Automated Penetration Testing
sponsored by Core Security Technologies
WHITE PAPER: This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved.
Posted: 19 Sep 2005 | Published: 01 Sep 2005

Core Security Technologies

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Next-Generation Vulnerability Management
sponsored by SAINT Corporation
WHITE PAPER: This crucial paper takes an in-depth look at how proper vulnerability management can protect business operations, mitigate risks, and improve overall IT management. Discover the latest solutions and strategies for ensuring your data is secure from attacks.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SAINT Corporation

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

Rapid7

Webroot Secure Anywhere - Endpoint Protection
sponsored by OpenText Security Solutions
WHITE PAPER: Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

OpenText Security Solutions

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER: In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010

eEye Digital Security

Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER: This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Patch management: Fixing vulnerabilities before they are exploited
sponsored by GFI LanGuard
WHITE PAPER: Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

Why Free Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER: This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Lumension